SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 6 (May. - Jun. 2013), PP 39-42
www.iosrjournals.org
www.iosrjournals.org 39 | Page
Improving security for data migration in cloud computing using
randomized encryption technique
Rashmi Rao1
, Pawan Prakash 1
1
(Dept .of Computer Science and Engineering, Gyan Vihar University, Jaipur, Rajasthan, India)
Abstract : With the increase in the development of cloud computing environment, the security has become the
major concern that has been raised more consistently in order to move data and applications to the cloud as
individuals do not trust the third party cloud computing providers with their private and most sensitive data and
information. In this paper, I proposed an encryption technique in cloud computing environment using
randomization method to increase security and optimize the encrypted data in migration process.
Keywords – Attribute based encryption, cloud computing, data migration, prediction based encryption,
randomization
I. Introduction
Cloud computing has become the emerging paradigm in the world of computing resources [1] and is
considered far better than the traditional paradigms of computing. The collection of machines and web services
forms a cloud in cloud computing terminology. The various computing resources and applications are provided
over the internet by cloud computing paradigm on the basis of different demands of its customers. Moreover, it
also helps in reducing their operating costs and risks and thus presenting cost-effective solutions to various
enterprises.
These numbers of benefits are the reason for organizations to bring the migration of resources and its
applications into cloud. Data Migration is a turning point in the cloud environment that brings the new way to
perform the risk management. It is a method to move or migrate the data, resources, applications or other
beneficial components from any organization’s on-site system into cloud or from one cloud to another cloud.
The migration of the latter type is generally called as cloud-to-cloud migration. Along with its benefits, data
migration in the cloud possesses some major security issues also such as data confidentiality, data integrity,
reliability and portability of data and application, data security etc. Thus in this paper, we are proposing a
modified and enhanced encryption algorithm with the concept of randomization in order to make the migration
of data in the cloud more secure and optimized. This paper further proceeds with the following sections:
1. Cloud computing and its services
2. Data migration and its Security issues
3. Literature review
4. Proposed work
5. Conclusion
6. References
II. Cloud Computing And Its Services
Cloud computing is an emerging paradigm for computation of number of resources [1] and data than
the traditional methods of computing. In other words, cloud computing is an advanced technology that brought
up the concept of providing computing resources over the internet. It is the pool of resources and applications
that are available to its users via internet and provides variety of computing infrastructures for various
applications of processing data and its storage.
Cloud computing also describes – platform and type of application. By describing platform, it means to
supply the machines or servers – whether a physical machine or a virtual machine and also to configure and
reconfigure these machines.
On the demand of its users, the various computing resources are likely to be available over the internet
through cloud computing. In this manner, different forms of resource –hardware and software resources can be
utilized in a flexible and scalable manner thereby reducing their costs and providing cost-effective solutions to
various enterprises. Therefore, cloud computing can be compared to e-business and it is considered as influential
as e-business [1].
2.1 Cloud Services
There are three on-demand services classified by cloud as follows:
Improving security for data migration in cloud computing using randomized encryption technique
www.iosrjournals.org 40 | Page
Software as a service (SaaS) in which application softwares are provided as a service to the clients via
internet which are totally under the control of cloud service providers. It provides transparency of data.
Platform as a service (PaaS) in which platform or solution stack is provided as a service without operating the
hardware and software layers and its cost and complexity.
Infrastructure as a service (IaaS) in which infrastructure or a virtualization environment is provided as a
service.
III. Data Migration In Cloud
It is the method of moving a large amount of data and applications into the target cloud where the
target cloud can be – a public, a private or hybrid cloud. [4] Since large numbers of applications are required to
fulfill an organization’s business needs and to improve its growth, various models of DaaS (Database as a
service) are now provided keeping in view the data migration process. The data can be migrated in several ways
such as –from any organization to a target cloud or from one cloud to another cloud.[3] But it is quite
challenging task to migrate data and it involves various major security issues as well like data integrity, security,
portability, data privacy, data accuracy etc [5].
3. HEADING S (11 BOLD)
Fig.1 Data migration in cloud
3.1 Security Challenge In Data Migration
0 20 40 60 80
Integrity
Portability
Performance
Availability
Security
Series2
Column2
76%
65%
65%
60%
53%
Fig2. Rate Chart of Major Issues in Cloud
Now, from the above rate chart of various issues in the cloud, we can see that the security is the major
concern and hence, it is needed that the global security threats of the cloud should be prevented. Thus there is an
ample need for securing data migration process and improving its security. In order to strongly secure the data
Cloud
database
Cloud
database
Organizations
Improving security for data migration in cloud computing using randomized encryption technique
www.iosrjournals.org 41 | Page
migration process, we tried to propose an improved and enhanced encryption algorithm by using the concept of
randomization.
IV. Literature Review
As far as the security issue for data migration is concerned, the various cryptographic methods have
been used earlier such as Identity Based Encryption (IBE), Attribute Based Encryption (ABE) and Prediction
Based Encryption (PBE). [7]In Identity Based method, a unique identifier of the receiver such as e-mail address
is used for calculating the public key by the third party servers. In contrast with typical public cryptography, this
method proved to be more beneficial for reducing the complexity of processing the encryption method. But this
method proved to be less effective for making the data more secure and optimized for migration as it needed a
centralized server and secure channel between the source and destination.8] Then Sahai and Waters (2005)
introduced the concept of attribute based encryption method, in which instead of using identifiers, an attribute
was taken into consideration for encryption method. But it also proved to be weak for ensuring strong and
secure data migration.
After these methods, a new method has come into consideration known as Prediction Based Encryption
(PBE). [6] This method is generally used for multicasting and is originated from both –Identity Based
Encryption (IBE) and Attribute Based Encryption (ABE). While in IBE method, identity of an entity is used for
encryption key and decryption key as well, the PBE (prediction based encryption) method is much better
scheme as the identity of an entity is derived from a set of attributes and for decryption, access policies are
there. [3]
It includes following four steps for performing encryption, decryption and generating key.
a) SetUp: to generate a secret key that acts as a master key, for generating decryption key and a set of public
parameters.
b) KeyGen: a decryption key is generated by using this operation.
c) Encrypt: this operation performs the encryption of plain text with the help of public parameters and
supplied encryption key.
d) Decrypt: is used for decrypting the cipher text.
In this way, Prediction Based Encryption method proved to be effective for providing security of data
in cloud. But, still it lacks a more efficient mechanism for making data security stronger and maintaining the
work reliability. Therefore, in this paper we proposed an approach of using randomization and creating an
enhanced encryption method so as to improve the security of data migration process in cloud.
V. Proposed Work
In my proposed work, I am creating an encryption algorithm to provide strong security to data in cloud
that would be better in performance than using already existing encryption algorithm like PBE(prediction based
encryption),IBE(Identity Based Encryption) etc.
In this encryption method, the concept of randomization will be used. In randomization concept, we
initially start with encrypting a single plaintext P into a number of cipher texts such as C1,C2,…Cn and then
randomly select any one of the N cipher texts and secondly, map any of those cipher texts back into the original
plain text since the one who decrypts the text has no knowledge about which one has been picked.
One thing that must be taken into consideration is that the cipher text should be longer in length as
compared to the plain text otherwise a problem may occur. It means that the cipher text should be atleast logn
bits longer so as to perform better. In this way, n2k=2k+logn cipher texts are there and 2k+ logn bit pattern will
be available to express them.
5.1 Enhanced algorithm is as follows:
For Encryption
1) Initially, generate a random key.
2) Encrypt the data using that random key.
3) Encrypt the random key with the shared key.
4) Forward the data after encryption process from step 2 and step 3 together.
For Decryption
1) Now decrypt the encrypted random key with the shared key.
2) Then, decrypt the encrypted data with the decrypted random key.
Improving security for data migration in cloud computing using randomized encryption technique
www.iosrjournals.org 42 | Page
Fig 3.Proposed Method
Here, the shared key is re-used but the random key is used only once for encrypting data. Hence, by applying
this method, the data can be made more secure and reliable as the outsider will have no idea about what data is
encrypted with the persistent key.
VI. Conclusion
Since the security challenges are increasing day-by-day in the cloud computing environment and the
privacy of clients is at risk as the data is transferred from one cloud to another cloud during the migration
process. The security of data has become the major issue in cloud environment. Here we focused in improving
the data security with the randomized encryption technique.
After proposing this enhanced encryption algorithm using randomization technique, we came to the
conclusion that by creating a random key for encrypting the data, the attacker can get confused over what data is
encrypted with persistent key and he becomes unable to analyze even by comparison that if the two encrypted
texts corresponds to the same plaintext. It means that if an outsider or attacker encrypts the plaintext or obstructs
the cipher text, then he can simply compare among the encrypted message. But the advantage of adding
randomness is that the risk of attack from the unknown outsider can be easily removed. In future, we will try to
focus on more security issues of cloud computing and give some better solutions to achieve strong security
using cryptography in data migration process.
References
[1] 15th International Conference on Management of Data COMAD 2009, Mysore, India, December 9–12, 2009 ©Computer Society of
India, 2009, A Unified and Scalable Data
Migration Service for the Cloud Environments
[2] Gartner (2008). Gartner Says Cloud Computing Will Be as Influential As E-business. Gartner press release, 26 June 2008.
http://www.gartner.com/it/page.jsp?id=707508. Retrieved 3rd May 2010.
[3] Secure Migration of Various Database over A Cross Platform Environment, an International Journal Of Engineering And Computer
Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013
[4] Data Migration: Connecting Databases in the Cloud, a research paper published by authors: Farah Habib Chanchary and Samiul Islam
in ICCIT 2012.
[5] Using the cloud for data migration: practical issues and legal implications - 16 Feb 2011 - Computing Feature
[6] A Security approach for Data Migration in Cloud Computing , an International Journal of Scientific and Research Publications,
Volume 3, Issue 5, May 2013 1 ISSN 2250-3153
[7] QuickStudy: Identity-based encryption by Russell Kay
[8] Research Report RR-06-164 Enabling Secure Service Discovery with Attribute Based Encryption, by Slim Trabelsi, Yves Roudier.
Encryption Random key KeyGen Decryption
Setup
operation

More Related Content

What's hot

Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...ijiert bestjournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 

What's hot (20)

Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
H1803035056
H1803035056H1803035056
H1803035056
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 
El35782786
El35782786El35782786
El35782786
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 

Viewers also liked

Ethopian Database Management system as a Cloud Service: Limitations and advan...
Ethopian Database Management system as a Cloud Service: Limitations and advan...Ethopian Database Management system as a Cloud Service: Limitations and advan...
Ethopian Database Management system as a Cloud Service: Limitations and advan...IOSR Journals
 
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...IOSR Journals
 
Solar Based Stand Alone High Performance Interleaved Boost Converter with Zvs...
Solar Based Stand Alone High Performance Interleaved Boost Converter with Zvs...Solar Based Stand Alone High Performance Interleaved Boost Converter with Zvs...
Solar Based Stand Alone High Performance Interleaved Boost Converter with Zvs...IOSR Journals
 
A New Filtering Method and a Novel Converter Transformer for HVDC System.
A New Filtering Method and a Novel Converter Transformer for HVDC System.A New Filtering Method and a Novel Converter Transformer for HVDC System.
A New Filtering Method and a Novel Converter Transformer for HVDC System.IOSR Journals
 
E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...IOSR Journals
 
Customers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadCustomers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadIOSR Journals
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...IOSR Journals
 
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...IOSR Journals
 
Power Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETPower Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETIOSR Journals
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesIOSR Journals
 
Hand Vien Recognotion Using Matlab
Hand Vien Recognotion Using MatlabHand Vien Recognotion Using Matlab
Hand Vien Recognotion Using MatlabIOSR Journals
 
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...IOSR Journals
 
Influence of Different Soil Management Practices On Soil Properties and Its I...
Influence of Different Soil Management Practices On Soil Properties and Its I...Influence of Different Soil Management Practices On Soil Properties and Its I...
Influence of Different Soil Management Practices On Soil Properties and Its I...IOSR Journals
 
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...IOSR Journals
 
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...IOSR Journals
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
 
Portfolio Cost Management in Offshore Software Development Outsourcing Relat...
Portfolio Cost Management in Offshore Software Development  Outsourcing Relat...Portfolio Cost Management in Offshore Software Development  Outsourcing Relat...
Portfolio Cost Management in Offshore Software Development Outsourcing Relat...IOSR Journals
 

Viewers also liked (20)

Ethopian Database Management system as a Cloud Service: Limitations and advan...
Ethopian Database Management system as a Cloud Service: Limitations and advan...Ethopian Database Management system as a Cloud Service: Limitations and advan...
Ethopian Database Management system as a Cloud Service: Limitations and advan...
 
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
 
Solar Based Stand Alone High Performance Interleaved Boost Converter with Zvs...
Solar Based Stand Alone High Performance Interleaved Boost Converter with Zvs...Solar Based Stand Alone High Performance Interleaved Boost Converter with Zvs...
Solar Based Stand Alone High Performance Interleaved Boost Converter with Zvs...
 
A New Filtering Method and a Novel Converter Transformer for HVDC System.
A New Filtering Method and a Novel Converter Transformer for HVDC System.A New Filtering Method and a Novel Converter Transformer for HVDC System.
A New Filtering Method and a Novel Converter Transformer for HVDC System.
 
E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...
 
Customers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadCustomers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in Hyderabad
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
 
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
 
Power Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETPower Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANET
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
 
Hand Vien Recognotion Using Matlab
Hand Vien Recognotion Using MatlabHand Vien Recognotion Using Matlab
Hand Vien Recognotion Using Matlab
 
K0428699
K0428699K0428699
K0428699
 
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
 
Influence of Different Soil Management Practices On Soil Properties and Its I...
Influence of Different Soil Management Practices On Soil Properties and Its I...Influence of Different Soil Management Practices On Soil Properties and Its I...
Influence of Different Soil Management Practices On Soil Properties and Its I...
 
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
 
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 
Portfolio Cost Management in Offshore Software Development Outsourcing Relat...
Portfolio Cost Management in Offshore Software Development  Outsourcing Relat...Portfolio Cost Management in Offshore Software Development  Outsourcing Relat...
Portfolio Cost Management in Offshore Software Development Outsourcing Relat...
 

Similar to Improving security for data migration in cloud computing using randomized encryption technique

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
An4201262267
An4201262267An4201262267
An4201262267IJERA Editor
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud EncryptionSamuel Borthwick
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 

Similar to Improving security for data migration in cloud computing using randomized encryption technique (20)

C017421624
C017421624C017421624
C017421624
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
An4201262267
An4201262267An4201262267
An4201262267
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Br36413417
Br36413417Br36413417
Br36413417
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud Encryption
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
B1802041217
B1802041217B1802041217
B1802041217
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

Improving security for data migration in cloud computing using randomized encryption technique

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 6 (May. - Jun. 2013), PP 39-42 www.iosrjournals.org www.iosrjournals.org 39 | Page Improving security for data migration in cloud computing using randomized encryption technique Rashmi Rao1 , Pawan Prakash 1 1 (Dept .of Computer Science and Engineering, Gyan Vihar University, Jaipur, Rajasthan, India) Abstract : With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. In this paper, I proposed an encryption technique in cloud computing environment using randomization method to increase security and optimize the encrypted data in migration process. Keywords – Attribute based encryption, cloud computing, data migration, prediction based encryption, randomization I. Introduction Cloud computing has become the emerging paradigm in the world of computing resources [1] and is considered far better than the traditional paradigms of computing. The collection of machines and web services forms a cloud in cloud computing terminology. The various computing resources and applications are provided over the internet by cloud computing paradigm on the basis of different demands of its customers. Moreover, it also helps in reducing their operating costs and risks and thus presenting cost-effective solutions to various enterprises. These numbers of benefits are the reason for organizations to bring the migration of resources and its applications into cloud. Data Migration is a turning point in the cloud environment that brings the new way to perform the risk management. It is a method to move or migrate the data, resources, applications or other beneficial components from any organization’s on-site system into cloud or from one cloud to another cloud. The migration of the latter type is generally called as cloud-to-cloud migration. Along with its benefits, data migration in the cloud possesses some major security issues also such as data confidentiality, data integrity, reliability and portability of data and application, data security etc. Thus in this paper, we are proposing a modified and enhanced encryption algorithm with the concept of randomization in order to make the migration of data in the cloud more secure and optimized. This paper further proceeds with the following sections: 1. Cloud computing and its services 2. Data migration and its Security issues 3. Literature review 4. Proposed work 5. Conclusion 6. References II. Cloud Computing And Its Services Cloud computing is an emerging paradigm for computation of number of resources [1] and data than the traditional methods of computing. In other words, cloud computing is an advanced technology that brought up the concept of providing computing resources over the internet. It is the pool of resources and applications that are available to its users via internet and provides variety of computing infrastructures for various applications of processing data and its storage. Cloud computing also describes – platform and type of application. By describing platform, it means to supply the machines or servers – whether a physical machine or a virtual machine and also to configure and reconfigure these machines. On the demand of its users, the various computing resources are likely to be available over the internet through cloud computing. In this manner, different forms of resource –hardware and software resources can be utilized in a flexible and scalable manner thereby reducing their costs and providing cost-effective solutions to various enterprises. Therefore, cloud computing can be compared to e-business and it is considered as influential as e-business [1]. 2.1 Cloud Services There are three on-demand services classified by cloud as follows:
  • 2. Improving security for data migration in cloud computing using randomized encryption technique www.iosrjournals.org 40 | Page Software as a service (SaaS) in which application softwares are provided as a service to the clients via internet which are totally under the control of cloud service providers. It provides transparency of data. Platform as a service (PaaS) in which platform or solution stack is provided as a service without operating the hardware and software layers and its cost and complexity. Infrastructure as a service (IaaS) in which infrastructure or a virtualization environment is provided as a service. III. Data Migration In Cloud It is the method of moving a large amount of data and applications into the target cloud where the target cloud can be – a public, a private or hybrid cloud. [4] Since large numbers of applications are required to fulfill an organization’s business needs and to improve its growth, various models of DaaS (Database as a service) are now provided keeping in view the data migration process. The data can be migrated in several ways such as –from any organization to a target cloud or from one cloud to another cloud.[3] But it is quite challenging task to migrate data and it involves various major security issues as well like data integrity, security, portability, data privacy, data accuracy etc [5]. 3. HEADING S (11 BOLD) Fig.1 Data migration in cloud 3.1 Security Challenge In Data Migration 0 20 40 60 80 Integrity Portability Performance Availability Security Series2 Column2 76% 65% 65% 60% 53% Fig2. Rate Chart of Major Issues in Cloud Now, from the above rate chart of various issues in the cloud, we can see that the security is the major concern and hence, it is needed that the global security threats of the cloud should be prevented. Thus there is an ample need for securing data migration process and improving its security. In order to strongly secure the data Cloud database Cloud database Organizations
  • 3. Improving security for data migration in cloud computing using randomized encryption technique www.iosrjournals.org 41 | Page migration process, we tried to propose an improved and enhanced encryption algorithm by using the concept of randomization. IV. Literature Review As far as the security issue for data migration is concerned, the various cryptographic methods have been used earlier such as Identity Based Encryption (IBE), Attribute Based Encryption (ABE) and Prediction Based Encryption (PBE). [7]In Identity Based method, a unique identifier of the receiver such as e-mail address is used for calculating the public key by the third party servers. In contrast with typical public cryptography, this method proved to be more beneficial for reducing the complexity of processing the encryption method. But this method proved to be less effective for making the data more secure and optimized for migration as it needed a centralized server and secure channel between the source and destination.8] Then Sahai and Waters (2005) introduced the concept of attribute based encryption method, in which instead of using identifiers, an attribute was taken into consideration for encryption method. But it also proved to be weak for ensuring strong and secure data migration. After these methods, a new method has come into consideration known as Prediction Based Encryption (PBE). [6] This method is generally used for multicasting and is originated from both –Identity Based Encryption (IBE) and Attribute Based Encryption (ABE). While in IBE method, identity of an entity is used for encryption key and decryption key as well, the PBE (prediction based encryption) method is much better scheme as the identity of an entity is derived from a set of attributes and for decryption, access policies are there. [3] It includes following four steps for performing encryption, decryption and generating key. a) SetUp: to generate a secret key that acts as a master key, for generating decryption key and a set of public parameters. b) KeyGen: a decryption key is generated by using this operation. c) Encrypt: this operation performs the encryption of plain text with the help of public parameters and supplied encryption key. d) Decrypt: is used for decrypting the cipher text. In this way, Prediction Based Encryption method proved to be effective for providing security of data in cloud. But, still it lacks a more efficient mechanism for making data security stronger and maintaining the work reliability. Therefore, in this paper we proposed an approach of using randomization and creating an enhanced encryption method so as to improve the security of data migration process in cloud. V. Proposed Work In my proposed work, I am creating an encryption algorithm to provide strong security to data in cloud that would be better in performance than using already existing encryption algorithm like PBE(prediction based encryption),IBE(Identity Based Encryption) etc. In this encryption method, the concept of randomization will be used. In randomization concept, we initially start with encrypting a single plaintext P into a number of cipher texts such as C1,C2,…Cn and then randomly select any one of the N cipher texts and secondly, map any of those cipher texts back into the original plain text since the one who decrypts the text has no knowledge about which one has been picked. One thing that must be taken into consideration is that the cipher text should be longer in length as compared to the plain text otherwise a problem may occur. It means that the cipher text should be atleast logn bits longer so as to perform better. In this way, n2k=2k+logn cipher texts are there and 2k+ logn bit pattern will be available to express them. 5.1 Enhanced algorithm is as follows: For Encryption 1) Initially, generate a random key. 2) Encrypt the data using that random key. 3) Encrypt the random key with the shared key. 4) Forward the data after encryption process from step 2 and step 3 together. For Decryption 1) Now decrypt the encrypted random key with the shared key. 2) Then, decrypt the encrypted data with the decrypted random key.
  • 4. Improving security for data migration in cloud computing using randomized encryption technique www.iosrjournals.org 42 | Page Fig 3.Proposed Method Here, the shared key is re-used but the random key is used only once for encrypting data. Hence, by applying this method, the data can be made more secure and reliable as the outsider will have no idea about what data is encrypted with the persistent key. VI. Conclusion Since the security challenges are increasing day-by-day in the cloud computing environment and the privacy of clients is at risk as the data is transferred from one cloud to another cloud during the migration process. The security of data has become the major issue in cloud environment. Here we focused in improving the data security with the randomized encryption technique. After proposing this enhanced encryption algorithm using randomization technique, we came to the conclusion that by creating a random key for encrypting the data, the attacker can get confused over what data is encrypted with persistent key and he becomes unable to analyze even by comparison that if the two encrypted texts corresponds to the same plaintext. It means that if an outsider or attacker encrypts the plaintext or obstructs the cipher text, then he can simply compare among the encrypted message. But the advantage of adding randomness is that the risk of attack from the unknown outsider can be easily removed. In future, we will try to focus on more security issues of cloud computing and give some better solutions to achieve strong security using cryptography in data migration process. References [1] 15th International Conference on Management of Data COMAD 2009, Mysore, India, December 9–12, 2009 ©Computer Society of India, 2009, A Unified and Scalable Data Migration Service for the Cloud Environments [2] Gartner (2008). Gartner Says Cloud Computing Will Be as Influential As E-business. Gartner press release, 26 June 2008. http://www.gartner.com/it/page.jsp?id=707508. Retrieved 3rd May 2010. [3] Secure Migration of Various Database over A Cross Platform Environment, an International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 [4] Data Migration: Connecting Databases in the Cloud, a research paper published by authors: Farah Habib Chanchary and Samiul Islam in ICCIT 2012. [5] Using the cloud for data migration: practical issues and legal implications - 16 Feb 2011 - Computing Feature [6] A Security approach for Data Migration in Cloud Computing , an International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 ISSN 2250-3153 [7] QuickStudy: Identity-based encryption by Russell Kay [8] Research Report RR-06-164 Enabling Secure Service Discovery with Attribute Based Encryption, by Slim Trabelsi, Yves Roudier. Encryption Random key KeyGen Decryption Setup operation